Getting ready

To use Nmap to perform UDP, TCP stealth, TCP connect, or zombie scans, you will need to have a remote system that is running network services over UDP and TCP. In the examples provided, an instance of Metasploitable2 is used as a scan target, and an installation of Windows XP is used as an incremental IPID zombie. In the examples provided, a combination of Linux and Windows systems is used.

For more information on how to set up systems in a local lab environment, refer to the Installing Metasploitable2 and Installing Windows Server recipes in Chapter 1, Getting Started. Additionally, this section will require a script to be written to the filesystem using a text editor such as Vim or GNU nano. For more information on how to write scripts, refer to the Using text editors (Vim and GNU nano) recipe in Chapter 1, Getting Started.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset